Fig. 2. Architecture of the Banking System. C lient E nd. Server End. Server End. Server End. Server End. Graphical User Panel

Size: px
Start display at page:

Download "Fig. 2. Architecture of the Banking System. C lient E nd. Server End. Server End. Server End. Server End. Graphical User Panel"

Transcription

1 Distributed Banking with Mobile Agents: An Approach for E-Commerce R.B. PATEL and K. GARG Department of Electronics & Computer Engineering India Institute of Technology Roorkee, Roorkee , Uttaranchal, India Abstract: The anticipated increase in popular use of the Internet has created more opportunity in information dissemination, E-commerce, and multimedia communication. It has also created more challenges in organizing information and facilitating its efficient retrieval. From the network perspective, there are additional challenges and problems in meeting bandwidth requirement, as also in network management. In response to this, new techniques, languages and paradigms have evolved which facilitate the creation of such applications. Certainly the most promising among the new paradigms is the use of mobile agents. In this paper, mobile agent technology, as applied in an E-commerce application, is discussed. We report an implementation of a banking system, whose database may be distributed at different sites on the Internet. A customer can send his/her mobile agent to perform various tasks involved in banking and get back an appropriate result. PMADE is used as the platform to develop these mobile agents. Security checks have been also implemented, as this is an important requirement in E-commerce. Keywords: E-commerce, Mobile Agent, Distributed Database, Agent Host, Agent Submitter and PMADE. 1 Introduction Traditionally, the relationship between Providers and Customers has been specific, contractual, and largely static. The Internet, wireless and digital streaming technologies have opened up the possibilities for Providers to have as many Customers as possible and for Customers to have a choice between Providers. Together, the Internet and the Web, support growth opportunities in selling commodities, customer and service provider relationship, information searching, banking, product/service design, user support, geographic expansion, logistics, and supply chain integration. In this dynamic environment, the traditional challenge of managing a one-to-one relationship is giving way to the much greater challenge of managing many-to-one and one-to-many relationships. A user level application is an e-marketplace where vendors can set up online shops with products, services or information, for sale [1]. A commercial transaction may require real-time access to remote resources such as stock quotes, balance in accounts, current inventory, etc. For such transactions, we envision agents that embody the intentions of their creators and act and negotiate on their behalf. Mobile agent technology [2] is a very appealing solution to this kind of problem. A customer s agent would carry a shopping list along with a set of preferences, visit various sellers, get the best deal based on the preferences and purchase the product using digital forms of cash. Applications that need to monitor events on remote machines, such as, whether a particular bank account s balance has fallen below a threshold, are also benefited from mobile agents, since agents need not use the network for polling. Instead of periodically downloading bank statements, an agent can be sent to quote service to monitor the balance. The agent can inform the user when a specified event occurs. In this paper, we report on the implementation of such a banking system using mobile agent technology [3]. The mobile agent platform used is PMADE, which has been developed at IIT Roorkee itself [4, 5, 6, 7]. We are using PMADE because this platform provides mobility to agents as well as to Hosts both; other reason is that this platform can run in heterogeneous environment. The rest of the paper is organized as follows: Section 2 gives an overview of the Mobile Agent framework used for the development of application, i.e., PMADE. Section 3 discusses the architectural details of the developed banking system Section 4 gives details of the implementation of the system and the mobile agents required for this purpose. Results are discussed in section 5 and Section 6 concludes the paper. 2 Overview of PMADE Fig. 1 illustrates the detailed architecture of PMADE (A Platform for Mobile Agent Distribution and Execution) [5, 6, 7]. The Agent Host is the key component of PMADE. It consists of the manager modules and the Host Driver. The Host Driver is the basic utility module, which lies below the manager modules and is responsible for driving the Agent Host by ensuring proper co-ordination between various managers and making them work in tandem. Various manager modules form an essential part of the Agent Host. The Agent (AM) authenticates the connection with the help of (UM) and Signature (SM), as per the Agent Transfer 1

2 Protocol [4, 6] requirements. If it is able to receive the agent, it passes it to the Cloning (CM). Here, a clone of the mobile agent is created and forwarded to other Agent Hosts, if required, with the help of Address (NAM). The Host Driver summons the Agent Reply (ARM) to formulate the reply and dispatch the same to the Agent Host/Agent Submitter of the respective mobile agent. Agent Host Agents Objects Applications Signature Address Agent Cloning Host Driver Service Bridge Task Agent Submitter Resource Account Broker Agent Reply Persistence Security Agent Receiver Agent to Agent Communication (Message Queue Processor) Fig. 1. Architecture of PMADE The model also provides an in-built resource accounting feature. End-users are required to subscribe, to utilize the services of the base server (parent agent Host-where an agent is first submitted). The Resource Accounting (RAM) does this. Similarly, the Persistence (PM) is provided, so that, in case of system shutdown/breakdown, the agent state can be saved and restored for the sake of security and continuity. Provision has been also made for a Broker (BM) in the model, to facilitate brokering on the Internet. The Security (SM) provides security to Agent Host from malicious Mobile Agents as also to the static data/credential information of a Mobile Agent running on an Agent Host, from other agents running on the same host. A detailed discussion of these managers is beyond the scope of this paper, but can be seen in [4, 6]. 3 Architecture and Design of the Banking System The aspect of E-Commerce [10], on which we focus in this paper, is the payment for procurement of some commodity in any part of the world. These payments are typically done from a single account, but several alternative accounts may exist. The customer (client) dispatches one or more mobile agents, each with its list of required modes of transaction, amount and potential accounts/banks. The mobile agent visits each bank server intern to perform the required transaction. If the desired account is present, it processes the transaction on behalf of the user, else it moves to other bank servers. If the transaction is committed, or the bank list is exhausted, the mobile agent returns to the customer with the details of the operations performed. 3.1 Bank Server This is the central module of the application. All the functionality of the bank resides here. All mobile agents report to this module, which performs the actual operation (authentication & transaction) on a database and returns an appropriate message to the agent. As mentioned earlier, we have developed the banking system over PMADE. The architecture is illustrated in Fig. 2. The Bank administrator creates new accounts and has the power to check and manipulate the user s account. The customer has to go physically to the server who incorporates this program and ask to open a new account. This module has to be hooked up with the mobile agent platform. A Graphical Interface (GUI) has been designed. The administrator uses the services of the following: New-Account module: This module helps to create an account & check and update its information. It returns a Credit Card ID and Account Holder Signature for every new account. Credit Card ID is automatically generated by the database. Account Holder Signature is generated using Hashing Algorithms (SHA-1 or MD5) and signed with DSA for checking tampering. Balance module accepts the Credit Card ID and Account Holder Signature of an existing account and returns the balance in that account from the Balance Book. The entire procedure takes place via a form. A GUI has also been provided so that a customer, who has failed to submit a mobile agent, can himself/herself do a transaction. Credit and Debit modules: These modules perform the actual credit/debit into the account. All the above modules display appropriate messages after each operation, informing either successful transaction execution or stating reasons for failure. A GUI, with a Help facility, has been designed for ease of use of these modules. 2

3 The Bank Server has two stationary agents called the Credit Stationary Agent and Debit Stationary Agent, which provide second level security to the bank account is opened in the bank. It is searched by either Credit Card ID or by Account Holder Signature fields. Both can be considered as primary keys to this table Graphical Panel C lient E nd To Agent Submitter Interface PM ADE Server Bank Server System Administrator Bank Database Fig. 2. Architecture of the Banking System database after the authentication by PMADE itself. A mobile agent uses the services of these modules to perform the required transactions by furnishing the required parameters to them. Mobile agents do not themselves fetch, search or update the bank database. This is done for enhancing the security of the system and prevents an authorized customer from creating a malicious agent who can manipulate his/her account. The stationary agents perform the actual transaction and inform the mobile agents whether the transaction was successfully completed or reasons for its failure. 3.2 Distributed Database A distributed database [11] is required to hold all the data pertaining to the banking system, like details of customers, transactions completed, accounts, etc. It may be distributed by fragmentation, or replication, or both. The designed application supports all three types of distributed databases and uses a relational database model. All the updates are made in parallel in all parts of the database. Once a database is opened by an entity (mobile agent), no one else can access it (for updates, but reading is permissible) until this entity has released the database. Thus at any time, the database is under control of only one mobile agent. This feature supports concurrency control in the database. Deadlocks are avoided by making all operations independent of others and having a single control on the database. No cyclic dependency occurs and no roll back is required. The mobile agent may be terminated if it stays for a long period on the server or it may itself migrate to another server if it does not get access to the databases. The following tables are used in the database: Ledger Book: which contains information about every account holder. An entry is made in it whenever a new separately. These are generated automatically by the Bank Administrator whenever a new entry is made. A Mobile agent is checked for authentication by these fields before it is forwarded for further operation. Balance Book: has an entry for each account holder and contains information about the present balance in it. It is searched and updated by its two fields jointly, i.e., Credit Card ID and Account Holder Signature, each one is primary key to this table. It is updated whenever a transaction takes place, after authentication from the Ledger Book. Credit and Debit Books: Credit and Debit books are used to generate reports of all the transactions that the customer has made. An entry is made for every credit/debit transaction here. It is important to note that the database is opened in read only mode, since an agent may be required to find only the balance in an account. For e.g., a seller wanting to check if a potential customer has sufficient funds or not. 4 Implementation The application is developed in JAVA 2 version 1.2. PMADE is used as the mobile agent platform. All programming is done in Windows 9x/NT environment. (a) Design of Database: The database is made in MS Access 97 and the driver used to run this database is Microsoft Access Driver of ODBC (Object Database Connectivity). JAVA has its own database driver called JDBC (Java Database Connectivity). The interface between these two has been provided by JDBC-ODBC Protocol. All queries are made in SQL (Structured Query Language). 3

4 (b) Integration with the PMADE: s can interact with PMADE by developing agent application programs. In PMADE infrastructure, agent application programs are implemented as Java objects. s would first need to write a Java class that specifies some action, such as accessing a database on a remote node. Once this Java class is written and compiled, the user can launch the agent program in three ways: (1) via a GUI Agent Launch Wizard, (2) via a command line tool, or (3) using the external API (Agent Programming Interface). The first two mechanisms are provided with PMADE, while the last one requires the user to write a customized launch class, which makes use of the PMADE class libraries. (c) Mobile Agents A single agent is sufficient for performing the same task on different banks. When the agent reaches an Agent Host, it makes clones of itself and sends them to all the places where a bank server is running. Hence all the databases, where the customers account exists, are updated simultaneously, allowing concurrent execution. This feature makes handling of a distributed database possible. Three mobile agents are used in the Banking System. Every mobile agent implements Agent abstract class, this class provides property to an agent by which PMADE recognize it. The agent BFindAgent gets the balance in the customer s account. It carries information (customer name, customer ID and customer signature) about the Customer, for accessing its account. Agent AgentDebit debits from customer s account. When it reaches the agent host, it calls the AuthenticatorDebit stationary agent, which provides the actual operation to be performed on the database. It carries the information: customer name, customer ID, customer signature and amount. Similarly agent AgentCredit credits into a customer s account. When it reaches the agent host it calls the AuthenticatorCredit stationary agent which facilitates for performing actual operation on the database. It carries the information: customer name, customer ID, customer signature, Cheque/DD/No, Cheque/DD Date, Paying bank name and amount on the cheque/dd. user of this host is accepted. Due to this reason, propagation and authentication time is large in this case, because an acknowledgement information is required to be sent to the host (agent launcher host). This model is used when a customer/supplier wants to check the current balance in the account of a customer who wants to purchase/deliver some commodity from/to supplier/customer. It does not increase traffic on the network as only a single copy of the agent travels on the network. Table 1. Single agent migrating from node to node on Started from Agent Submitter Departed at Returned at Server IP Arrival to start processing database to leave database to depart Propagation/ Authentication Case 2: Parallel operation by cloned agents. Table 2 shows the movement of agent from an agent submitter to the parent agent host (this is host where the agent was first submitted). PMADE authentication (first level security) is done at this host only as it is treated as the master node for creating and controlling the clones. After authentication at the parent host, clones of the agent are created and launched to remote agent hosts. These clones work in parallel and after completion of the task at remote agent hosts, they are required to report at the parent host. When all the clones have returned to the parent host, the Cloning compiles the result and sends it to the Agent Reply, from where it reaches the agent launcher. This table shows a propagation/ authentication time of , which is very small in comparison to , of Table 1. Table 2 shows the cloned agent working at the database at the same time, i.e., the database is updated in parallel, as mentioned in section 3.2. This model is used for credit and debit operations. Table 2. Clones of an agent working in parallel on different nodes on Started from Agent Submitter Departed at Return at Server IP Arrival to start processing database to leave database to depart Propagation/ Authentication Discussion of Results We have tested our banking system on a 4-node network for two cases results of which are shown by Tables 1 and 2. Case 1: Serial itinerary with PMADE authentication [12, 13, 14, 15] at every host. Table 1 shows the movement of an agent from node to node. We have launched an agent and provided it a set of Agent Hosts ( nodes) where it has to do work. The agent is authenticated by PMADE at every host before accepting it. The agent comes from a client who is an authorized Note: is represented as hh:min:sec:millsec. We have tested on small amounts of data. When data is large, propagation and authentication time may be considered negligible. Both the cases can be used for finding customers account balance information or for credit/debit in the customer s account. 6 Conclusion This paper has reported on the implementation and results of a banking system based on mobile agents. 4

5 Security of the system from mobile agents has been incorporated at two levels. At the first level we authenticate mobile agents at the Agent Host. This is done by PMADE At the second level, the customer is authenticated by the stationary agents. The banking system has been implemented and tested over the Internet in the laboratory. In this paper we have reported only the Banking System part of an E-commerce system. Currently we are in the process of implementing a buyers/suppliers system. Agents are dispatched by the buyer to various suppliers, where they negotiate orders and deliveries, returning to the buyer with their best deals for approval. It is possible to have a deep supply chain, where a supplier may need to contact further suppliers of sub components in order to respond to an entry. Further, the application designed here is based on the pull model, in which the client s mobile agent visits the bank server. A different system, based on the push model, in which the bank s mobile agent regularly visits the client, is also being tried. Performance improves in this case as security checks can be bypassed. Also the bank can regularly advertise new schemes. It can also warn a client when he/she is low on credit (balance) etc, using its own agents. This is under consideration. References [1] Prithaviraj Dasgupta, Nitya Narasimhan, Louse E.Moser, MAgNET: Mobile Agents for ed Electronics Trading, IEEE Transaction On knowledge and data engineering, vol. 11, no. 4, July/Aug [2] Menelaos K. Perdikeas Fotis Chatzipapadopoulos and Lakovos S. Venieris, An Evaluation Study of mobile agent Technology: Standardization, Implementation and Evolution, IEEE, 1999, /99, pp [3] Agrawal, N., A Distributed Banking System Using Mobile Agents: An Approach for E-commerce, Masters Thesis Department of Electronics & Computer Engineering, IIT Roorkee, India, Feb [4] Patel, R.B. and Garg, K. A Mobile Agent Framework for Parallel & Distributed Computing (PMADE), A Technical Report [5] Patel R.B. and Garg Kumkum, PMADE A Platform for mobile agent Distribution & Execution, in the Proceedings of 5 th World MultiConference on Systemics, Cybernetics and Informatics (SCI2001) and 7 th International Conference on Information System Analysis and Synthesis (ISAS 2001), Orlando, Florida, USA, July 22-25, 2001, Vol. IV, pp [6] Patel R.B. and Garg Kumkum, Mobile Agent Management in PMADE, in Proceeding of ADCOM 2001, 9 th International conference on Advanced Computing and Communications, Bhubaneshwar, India, Dec , [7] Patel, R.B. and Garg, K., Communication Mechanisms for mobile agents, in Proceedings of First International ICSC Congress on AUTONOMOUS INTELLIGENT SYSTEMS, Deakin University Waterfront Campus, Geelong Australia, Feb , [8] Fünfrocken S., Migration of Java-based Mobile Agents - Capturing and Reestablishing the State of Java Programs, MA 98: Proceedings 2nd International Workshop on Mobile Agents, [9] Hyacinth S. Nwana Software Agents: An Overview, Knowledge Engineering Review, Vol. 11, No. 3, pp. 1-40, Sept. 1996, Cambridge University Press, [10] Azarmi Nader, Thint Marcus and Ohtani Takeshi, Enhancing E-Communities with Agent-Based Systems, IEEE Computer, pp , July [11] Jonathan Dale, A Mobile Agent Architecture for Distributed Information Management, Ph.D. thesis, 1997, [12] Wayne Jansen and Tom Karygiannis, NIST Special Publication Mobile Agent Security National Institute of Standards and Technology, Computer Security Division, Gaithersburg, MD [13] Nayeem Islam, et al., A Flexible Security System for Using Internet Content, IEEE Software, Sept. 1997, pp [14] Patel, R.B. and Garg, K., A Security Framework for Mobile Agent Systems, in Proceedings of 6 th International Conference on Business Information Systems (BIS 2003), Colorado, Spring, USA, June 4-6, 2003, pp [15] Patel, R.B. and Garg, K., Providing Security and Robustness to Mobile Agents on Open s, in Proceedings of 6 th International Conference on Business Information Systems (BIS 2003), Colorado, Spring, USA, June 4-6, 2003, pp (Received, Best Paper Award). 5

Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application

Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application Ajab Maheshwari PG Scholar, IT Dept, IET-DAVV, Indore (M.P.), India. Dr. Pratosh Bansal Associate Professor,

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Keywords: mobile agents, supply chain management, industrial application.

Keywords: mobile agents, supply chain management, industrial application. A Shipment Tracking System using Wireless technology and Mobile agents Mei-Ling L. Liu, Alfredo Macias, Thuan Ngo Computer Science Department, California Polytechnic State University, San Luis Obispo mliu@csc.calpoly.edu

More information

Trust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents

Trust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 67-72 International Research Publications House http://www. irphouse.com /ijict.htm Trust

More information

A Study of Application Recovery in Mobile Environment Using Log Management Scheme

A Study of Application Recovery in Mobile Environment Using Log Management Scheme A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, ashokannadurai@gmail.com, hariever4it@gmail.com,thangavelc@gmail.com, Bit Campus,

More information

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India kbchandradeep@gmail.com ABSTRACT This paper

More information

Self-organized Multi-agent System for Service Management in the Next Generation Networks

Self-organized Multi-agent System for Service Management in the Next Generation Networks PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to

More information

Information integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A

Information integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A Title Information integration platform for CIMS Author(s) Chan, FTS; Zhang, J; Lau, HCW; Ning, A Citation IEEE International Conference on Management of Innovation and Technology Proceedings, Singapore,

More information

E-commerce refers to paperless exchange of business information using following ways.

E-commerce refers to paperless exchange of business information using following ways. E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods

More information

E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones.

E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones. E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones Introduction E-Commerce Supply Chain Management involves the co-ordination

More information

EMS. Trap Collection Active Alarm Alarms sent by E-mail & SMS. Location, status and serial numbers of all assets can be managed and exported

EMS. Trap Collection Active Alarm Alarms sent by E-mail & SMS. Location, status and serial numbers of all assets can be managed and exported EMS SmartView TM Superior Design with Real-Time Monitor and Control Trap Collection Active Alarm Alarms sent by E-mail & SMS Network Topology Network Element Discovery Network Element Configuration Location,

More information

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,

More information

Product Overview. Contents

Product Overview. Contents Contents Product Overview Copyright 2002 - Xware AB. All rights reserved. xtrade is a registered trademark of Xware AB. Symphonia is a trademark of Orion Systems New Zealand Ltd. All rights reserved. 2

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Chintan Bhatt 1, Asha Koshti 2,Hemant Agrawal 3, Zakiya Malek 4, Dr Bhushan Trivedi 5 MCA Dept.,GLS Institute of Computer

More information

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement

More information

Research on Mobile Agent-based E-Commerce System Framework

Research on Mobile Agent-based E-Commerce System Framework 440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian 116024, China 1 wenal@sina.com, 2 somdyang@dlut.edu.cn ABSTRACT

More information

Digital Watermark Mobile Agents *

Digital Watermark Mobile Agents * Digital Watermark Mobile Agents * Jian Zhao and Chenghui Luo Fraunhofer Center for Research in Computer Graphics, Inc. 321 South Main Street Providence, RI 02903 Abstract Digital watermarking has emerged

More information

Digital Watermark Mobile Agents

Digital Watermark Mobile Agents In: Proc. of the 22 nd National Information System Security Conference Hyatt Regency, Crystal City, VA October 18-21, 1999 Digital Watermark Mobile Agents Jian Zhao and Chenghui Luo Fraunhofer Center for

More information

REMOTE CONTROL OF REAL EXPERIMENTS VIA INTERNET

REMOTE CONTROL OF REAL EXPERIMENTS VIA INTERNET REMOTE CONTROL OF REAL EXPERIMENTS VIA INTERNET Carine Campos Teixeira, carinect@ita.br Jeeves Lopes dos Santos, jeeves@ita.br Cairo Lúcio Nascimento Júnior, cairo@ita.br Instituto Tecnológico de Aeronáutica,

More information

The 8th International Conference on e-business (inceb2009) October 28th-30th, 2009

The 8th International Conference on e-business (inceb2009) October 28th-30th, 2009 A STUDY ON THE REQUIREMENTS AND TOOLS FOR REAL TIME FLEET MANAGEMENT E-BUSINESS SYSTEMS IN THAILAND Sirilak Borirug 1, Chun Che Fung 2, Wudhijaya Philuek 3 School of Information Technology, Murdoch University

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

A Generic Model for Querying Multiple Databases in a Distributed Environment Using JDBC and an Uniform Interface

A Generic Model for Querying Multiple Databases in a Distributed Environment Using JDBC and an Uniform Interface A Generic Model for Querying Multiple Databases in a Distributed Environment Using JDBC and an Uniform Interface Barkha Bhagwant Keni, M.Madiajagan, B.Vijayakumar Abstract - This paper discusses about

More information

DISTRIBUTED AND PARALLELL DATABASE

DISTRIBUTED AND PARALLELL DATABASE DISTRIBUTED AND PARALLELL DATABASE SYSTEMS Tore Risch Uppsala Database Laboratory Department of Information Technology Uppsala University Sweden http://user.it.uu.se/~torer PAGE 1 What is a Distributed

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

Mobile Software Agents: an Overview

Mobile Software Agents: an Overview Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

A Grid Architecture for Manufacturing Database System

A Grid Architecture for Manufacturing Database System Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies

More information

FioranoMQ 9. High Availability Guide

FioranoMQ 9. High Availability Guide FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

P2P VoIP for Today s Premium Voice Service 1

P2P VoIP for Today s Premium Voice Service 1 1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,

More information

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore

More information

Real-time Data Replication

Real-time Data Replication Real-time Data Replication from Oracle to other databases using DataCurrents WHITEPAPER Contents Data Replication Concepts... 2 Real time Data Replication... 3 Heterogeneous Data Replication... 4 Different

More information

Intelligent Shopping Agent

Intelligent Shopping Agent International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Intelligent Shopping Agent Sameer Shanbhag 1*, Sujith Nair 2 and Nikhil Nair3 1*,2,3

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons:

This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, Broadening Our Horizons: This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons: Information, Services, Technology -- Proceedings of the 1996 CAUSE

More information

Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems

Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,

More information

Secure Network Monitoring System using Mobile Agent

Secure Network Monitoring System using Mobile Agent 1 Secure Network Monitoring System using Mobile Agent G. M. Gaikwad 1, A. M. Kanthe 2, M. S. Chaudhari 3 1,2,3 Department of Computer Engg. Sinhgad Institute of Technology, Lonavala (India) 1 gmgaikwad@gmail.com

More information

Why MCL-Bridge for SAP

Why MCL-Bridge for SAP Why MCL-Bridge for SAP Visualize mobilized SAP R/3 Realize MCL-Bridge for SAP Why MCL-Bridge for SAP Does SAP R/3 drive your shop-floor operations retail, warehouse, distribution, manufacturing, or transportation

More information

Public Cloud Partition Balancing and the Game Theory

Public Cloud Partition Balancing and the Game Theory Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

Logical Data Models for Cloud Computing Architectures

Logical Data Models for Cloud Computing Architectures Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps

More information

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic

More information

Online Trading and Negotiation

Online Trading and Negotiation Online Trading and Negotiation Instructor: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Outline - Introduction of Trading -

More information

EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University

EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University 1 EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University Abstract In this document, we explain the various configurations

More information

LIVE VIDEO STREAMING USING ANDROID

LIVE VIDEO STREAMING USING ANDROID LIVE VIDEO STREAMING USING ANDROID Dharini Chhajed 1, Shivani Rajput 2 and Sneha Kumari 3 1,2,3 Department of Electronics Engineering, Padmashree Dr. D. Y. Patil Institute of Engineering and Technology,

More information

chapater 7 : Distributed Database Management Systems

chapater 7 : Distributed Database Management Systems chapater 7 : Distributed Database Management Systems Distributed Database Management System When an organization is geographically dispersed, it may choose to store its databases on a central database

More information

ERICSSON SOLIDUS ecare AGENT, MANAGEMENT AND SELF-SERVICE APPLICATIONS BUILT FOR BETTER BUSINESS

ERICSSON SOLIDUS ecare AGENT, MANAGEMENT AND SELF-SERVICE APPLICATIONS BUILT FOR BETTER BUSINESS ERICSSON SOLIDUS ecare AGENT, MANAGEMENT AND SELF-SERVICE APPLICATIONS BUILT FOR BETTER BUSINESS Ericsson Solidus ecare multimedia contact center is intelligently built on three fundamental groups of powerful

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

ANALYSIS OF THE WEB, PROCESSOR SPEED AND BANDWIDTH GROWTH: IMPACT ON SEARCH ENGINE DESIGN

ANALYSIS OF THE WEB, PROCESSOR SPEED AND BANDWIDTH GROWTH: IMPACT ON SEARCH ENGINE DESIGN ANALYSIS OF THE WEB, PROCESSOR SPEED AND BANDWIDTH GROWTH: IMPACT ON SEARCH ENGINE DESIGN K. Satya Sai Prakash Network Systems Laboratory IIT Madras, Chennai - 636 India Phone: 91-44-22578355 ssai@acm.org

More information

Job Costing for SAP Business One Functionality Set. Reporting Library, Report Writer and Query Based Reporting

Job Costing for SAP Business One Functionality Set. Reporting Library, Report Writer and Query Based Reporting One One An embedded cost management solution for all projects and activities across your enterprise. Prepare estimates and quotations, track labor, materials, purchases and resource usage against jobs,

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

SCADA Questions and Answers

SCADA Questions and Answers SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...

More information

Design and Implementation of Distributed Process Execution Environment

Design and Implementation of Distributed Process Execution Environment Design and Implementation of Distributed Process Execution Environment Project Report Phase 3 By Bhagyalaxmi Bethala Hemali Majithia Shamit Patel Problem Definition: In this project, we will design and

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

2. Accessing Databases via the Web

2. Accessing Databases via the Web Supporting Web-Based Database Application Development Quan Xia 1 Ling Feng 2 Hongjun Lu 3 1 National University of Singapore, Singapore, xiaquan@comp.nus.edu.sg 2 Hong Kong Polytechnic University, China,

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Retailer Operating Manual for e-books

Retailer Operating Manual for e-books Retailer Operating Manual for e-books Wholesale Distribution and Fulfillment Services Volume 1.1a Ingram Content Group, through its CoreSource and Lightning Source (LSI) companies, provides content fulfillment

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

Deployment Pattern. Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4

Deployment Pattern. Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4 Deployment Pattern Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4 Samsung Electronics 1,2,3, Hanyang University 4 alroad.son 1, jiwon.ss.kim 2, dude.kim 3 @samsung.net, undersense3538@gmail.com 4

More information

Enhancing A Software Testing Tool to Validate the Web Services

Enhancing A Software Testing Tool to Validate the Web Services Enhancing A Software Testing Tool to Validate the Web Services Tanuj Wala 1, Aman Kumar Sharma 2 1 Research Scholar, Department of Computer Science, Himachal Pradesh University Shimla, India 2 Associate

More information

Pipeline Orchestration for Test Automation using Extended Buildbot Architecture

Pipeline Orchestration for Test Automation using Extended Buildbot Architecture Pipeline Orchestration for Test Automation using Extended Buildbot Architecture Sushant G.Gaikwad Department of Computer Science and engineering, Walchand College of Engineering, Sangli, India. M.A.Shah

More information

Computer System Management: Hosting Servers, Miscellaneous

Computer System Management: Hosting Servers, Miscellaneous Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation

More information

Event-based middleware services

Event-based middleware services 3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image

More information

The Service Availability Forum Specification for High Availability Middleware

The Service Availability Forum Specification for High Availability Middleware The Availability Forum Specification for High Availability Middleware Timo Jokiaho, Fred Herrmann, Dave Penkler, Manfred Reitenspiess, Louise Moser Availability Forum Timo.Jokiaho@nokia.com, Frederic.Herrmann@sun.com,

More information

Simplifying Data Data Center Center Network Management Leveraging SDN SDN

Simplifying Data Data Center Center Network Management Leveraging SDN SDN Feb 2014, HAPPIEST MINDS TECHNOLOGIES March 2014, HAPPIEST MINDS TECHNOLOGIES Simplifying Data Data Center Center Network Management Leveraging SDN SDN Author Author Srinivas Srinivas Jakkam Jakkam Shivaji

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

The Implementation of Signing e-document by Using the Wireless Identity Module in Cellular Phone

The Implementation of Signing e-document by Using the Wireless Identity Module in Cellular Phone 832 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing The Implementation of Signing e-document by Using the Wireless Identity Module in Cellular Phone Chengyuan Ku *, Yenfang

More information

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud 1 S.Karthika, 2 T.Lavanya, 3 G.Gokila, 4 A.Arunraja 5 S.Sarumathi, 6 S.Saravanakumar, 7 A.Gokilavani 1,2,3,4 Student, Department

More information

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager 5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...

More information

Grid Computing Approach for Dynamic Load Balancing

Grid Computing Approach for Dynamic Load Balancing International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-1 E-ISSN: 2347-2693 Grid Computing Approach for Dynamic Load Balancing Kapil B. Morey 1*, Sachin B. Jadhav

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Design Patterns for Managing Product Lifecycle Information

Design Patterns for Managing Product Lifecycle Information Design Patterns for Managing Product Lifecycle Information Introduction Kary Främling, Timo Ala-Risku, Mikko Kärkkäinen, Jan Holmström The increasing demands on product lifecycle management means that

More information

A Review on Cloud Data Storage in Virtual Perspective

A Review on Cloud Data Storage in Virtual Perspective A Review on Cloud Data Storage in Virtual Perspective B.Nagarajan #1, Dr.J.Suguna *2 # Ph.D., Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore-621046, India. * Associate

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Performance Counters. Microsoft SQL. Technical Data Sheet. Overview:

Performance Counters. Microsoft SQL. Technical Data Sheet. Overview: Performance Counters Technical Data Sheet Microsoft SQL Overview: Key Features and Benefits: Key Definitions: Performance counters are used by the Operations Management Architecture (OMA) to collect data

More information

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity

More information

Overview - Snort Intrusion Detection System in Cloud Environment

Overview - Snort Intrusion Detection System in Cloud Environment International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm Overview

More information

Analysis of E-Commerce Security Protocols SSL and SET

Analysis of E-Commerce Security Protocols SSL and SET Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce

More information

Software Requirement Specification For Flea Market System

Software Requirement Specification For Flea Market System Software Requirement Specification For Flea Market System By Ilya Verlinsky, Alexander Sarkisyan, Ambartsum Keshishyan, Igor Gleyser, Andrey Ishuninov 1 INTRODUCTION 1.1 Purpose 1.1.1 Purpose of SRS document

More information

A guide to CLARiSUITE TM network solutions

A guide to CLARiSUITE TM network solutions Technical FAQ s CLARiSUITE Code Assurance A guide to CLARiSUITE TM network solutions Overview IT infrastructure security, integrity and stability are primary concerns of Videojet and its customers. Management

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

Design and Implementation of an Intelligent Network Monitoring and Management Tool in Internet and Intranet

Design and Implementation of an Intelligent Network Monitoring and Management Tool in Internet and Intranet International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 5, Number 2 (2012), pp. 83-89 International Research Publication House http://www.irphouse.com Design and Implementation

More information

1 File Processing Systems

1 File Processing Systems COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.

More information

Request for Proposal. Contract Management Software

Request for Proposal. Contract Management Software Request for Proposal Contract Management Software Ogden City Information Technology Division RETURN TO: Ogden City Purchasing Agent 2549 Washington Blvd., Suite 510 Ogden, Utah 84401 Attn: Sandy Poll 1

More information

SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE

SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE Breno Mansur Rabelo Centro EData Universidade do Estado de Minas Gerais, Belo Horizonte, MG, Brazil breno.mansur@uemg.br Clodoveu Augusto Davis

More information

Offline Data Synchronization in Order Management System

Offline Data Synchronization in Order Management System Offline Data Synchronization in Order Management System Abstract: We live in an increasingly connected world. However, in many cases we cannot rely on connectivity 100 percent of the time. Your users may

More information

Experiments in Collaborative Cloud-based Distance Learning

Experiments in Collaborative Cloud-based Distance Learning Experiments in Collaborative Cloud-based Distance Learning Aleksandar Karadimce, Danco Davcev Faculty of Computer Science and Engineering, University Ss Cyril and Methodius Skopje, R. Macedonia akaradimce@ieee.org,

More information